COMMENTARY
Cyber-incident attribution gets a lot of attention, for good reasons. Identifying the actor(s) behind an attack enables taking legal or political action against the adversary and helps cybersecurity researchers recognize and prevent future threats.
As I wrote in the first part of this series, attribution is both a technical and analytical process.…